Back to Search Start Over

An Intrusion Tracking Watermarking Scheme

Authors :
Jun Hou
Qianmu Li
Rong Tan
Shunmei Meng
Hanrui Zhang
Sainan Zhang
Source :
IEEE Access, Vol 7, Pp 141438-141455 (2019)
Publication Year :
2019
Publisher :
IEEE, 2019.

Abstract

With the rapid development of edge computing technology, the scale of the network continues to expand. Various types of applications are becoming more widespread. In the edge computing, existing network agents, NAT, IP tunneling technologies, and rapidly evolving anonymous communication systems provide convenience for attackers to hide real IP. In addition, the attacker forms a “stepping” chain by breaking through several intermediate systems of the edge computing network. Thereby implementing an invisible intrusion attack across multiple autonomous domains can increase the difficulty of intrusion tracking. Aiming at the problem of insufficient applicability of existing interval centroid based watermarking technique, this paper proposes a histogram specified interval centroid-based watermarking technique. It improves cross-domain collaborative intrusion tracking. This technique improves the resistance of the prior art to multi-flow attacks in edge computing. It decreases the time and space overhead of the detector. Compared with other interval centroid based watermarking techniques, this method has stronger concealment. The proposed method can effectively defend against multi-flow attacks of edge computing. The time and space overhead of the detector can be reduced when multiple attack flows are tracked in parallel. Thus, it is suitable for edge computing. The robustness and adaptability are improved by this method.

Details

Language :
English
ISSN :
21693536
Volume :
7
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.420a20efcd44de6b18647a590226cc4
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2019.2943493